SlideShare a Scribd company logo
1 of 14
Download to read offline
Dangers, Responsibility, Etiquette
E-Mail
Prepared By:
Brian S. Nelson,
Vice Chancellor, Legal Affairs and
General Counsel
Lone Star College System
E-Mail: Quick Facts
! In 2014, there were an estimated 600 billion e-mails
sent each day
! Of those emails – 70% are “spam”
Rule of Thumb
! An e-mail is a document. Do not put in an e-mail
something you would not sign as a letter or memo.
What does the “E” in e-mail stand for?
! Evidence
! Exhibit
! Embarrassment
Example
! -----Original Message----- 

From: 

Sent: Monday, October 19, 2009 7:34 AM 

To: 

Subject: RE: FREN 1412 course etiquette 



Even though he's a certifiable _______ , she can't just
cut him off. Non-compliance with class etiquette
requirements is another sort of problem to be dealt
with in another way - if he's mentions lawsuit again
we'll have to move to another level, though.

E-Mail: Dangers
! No reasonable expectation of privacy. Anything that is put
into e-mail becomes permanent.
! E-mail that is sent, received or stored on public server is
discoverable and may be used against the entity.
! Inadvertently sent messages, it is easier than not to send
confidential information to the wrong sender with the click
of a mouse.
! Unlimited accessibility allows for dangers in security and e-
mail fraud
E-Mail: Responsibility
! E-mail is not an alternative to casual conversation.
! Treat as formal communication. E-mails sent from public
accounts should be regarded with the same care as a formal
memorandum or letter.
! Always assume that e-mail contents can be published for the
world to see without your consent.
! Know when not to use e-mail.
! E-mails are subject to Public Information or Freedom of
Information Acts.
E-Mail: Responsibility
! When not to use email.
! Confidentiality is critical
! Message is likely to become extremely detailed and long.
! You need to confer with several people at once.
! You need to deliver bad news to one or more people.
E-Mail: Responsibility
! Texas Attorney General Decisions
! Institutions of higher education are subject to the
Texas Open Records Act, and records in their
custody are available to the public unless excepted
by a provision of the act or by some other law.1
1Attorney General Opinion No. JM-37
E-Mail: Responsibility
! Texas Public Information Act
! The Public Information Act (hereinafter “The Act”)
applies to records regardless of their format. It includes
information that is maintained in paper, tape, microfilm,
video, electronic data held in a computer memory, as well
as other mediums specified under law.1
E-mails sent/received are subject to the Texas Public
Information Act.
1 TEX. GOV’T CODE ANN. § 552.002 (Vernon 2004).
E-Mail: Etiquette
! General Etiquette
! Respond to the e-mail you receive.
! Never convey anger, use profanity, make racist, ethnic,
sexist or other potentially derogatory remarks.
! If you cannot reply quickly, let the sender know.
! Be professional!
E-Mail: Etiquette
! Formatting errors
! Spell check
! Do not type in all caps
! Use proper punctuation
! Avoid slang
! Importance of salutations and closings.
! Use of signatures.
! Use of abbreviations.
! Use a proper, meaningful subject header.
E-Mail: Final Thought
Remember: “E” in Email stands for
! Evidence
! Exhibit
! Embarrassment
E-mails are a direct representation of you.
Prepared By:
Brian S. Nelson,
Vice Chancellor, Legal Affairs and General Counsel
Lone Star College System
14

More Related Content

What's hot

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Special topics
Special topicsSpecial topics
Special topicsaivarose
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.katnaylan
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICSRJ Khan
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addictionmabahongutot
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issuesMaher Al Beshlawy
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2bigmike18
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 

What's hot (20)

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Special topics
Special topicsSpecial topics
Special topics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Chapter8
Chapter8Chapter8
Chapter8
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Ethics
EthicsEthics
Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Cyber Bullying and Internet Addiction
Cyber Bullying and Internet AddictionCyber Bullying and Internet Addiction
Cyber Bullying and Internet Addiction
 
Working with ict ethical social and legal issues
Working with ict ethical social and legal issuesWorking with ict ethical social and legal issues
Working with ict ethical social and legal issues
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyberbullying2
Cyberbullying2Cyberbullying2
Cyberbullying2
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 

Similar to E-Mail

Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...jonneiditz
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime pptOnkar1431
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityJonathan Stray
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media TrainingWilliam Mann
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
Week 8 Discussion 1The Investigation of Computer-Related Crime.docx
Week 8 Discussion 1The Investigation of Computer-Related Crime.docxWeek 8 Discussion 1The Investigation of Computer-Related Crime.docx
Week 8 Discussion 1The Investigation of Computer-Related Crime.docxphilipnelson29183
 
OBHT electronic comm
OBHT electronic commOBHT electronic comm
OBHT electronic commpascastpt
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safetyheidirobison
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
Argumentative Essay On Domestic Violence.pdf
Argumentative Essay On Domestic Violence.pdfArgumentative Essay On Domestic Violence.pdf
Argumentative Essay On Domestic Violence.pdfJacqueline Ramirez
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquettelinus007
 
How to Reclaim your Email Using Whitelists
How to Reclaim your Email Using WhitelistsHow to Reclaim your Email Using Whitelists
How to Reclaim your Email Using WhitelistsSendio
 
FirstQuizITWS01.pptx
FirstQuizITWS01.pptxFirstQuizITWS01.pptx
FirstQuizITWS01.pptxJairoAmigable
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Employers Association of New Jersey
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 

Similar to E-Mail (20)

Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Email crime ppt
Email crime pptEmail crime ppt
Email crime ppt
 
Email Essentials
Email EssentialsEmail Essentials
Email Essentials
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Email & Social Media Training
Email & Social Media TrainingEmail & Social Media Training
Email & Social Media Training
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
Week 8 Discussion 1The Investigation of Computer-Related Crime.docx
Week 8 Discussion 1The Investigation of Computer-Related Crime.docxWeek 8 Discussion 1The Investigation of Computer-Related Crime.docx
Week 8 Discussion 1The Investigation of Computer-Related Crime.docx
 
OBHT electronic comm
OBHT electronic commOBHT electronic comm
OBHT electronic comm
 
Va laws internet safety
Va laws internet safetyVa laws internet safety
Va laws internet safety
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
Argumentative Essay On Domestic Violence.pdf
Argumentative Essay On Domestic Violence.pdfArgumentative Essay On Domestic Violence.pdf
Argumentative Essay On Domestic Violence.pdf
 
IST
ISTIST
IST
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
How to Reclaim your Email Using Whitelists
How to Reclaim your Email Using WhitelistsHow to Reclaim your Email Using Whitelists
How to Reclaim your Email Using Whitelists
 
FirstQuizITWS01.pptx
FirstQuizITWS01.pptxFirstQuizITWS01.pptx
FirstQuizITWS01.pptx
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 

E-Mail

  • 1. Dangers, Responsibility, Etiquette E-Mail Prepared By: Brian S. Nelson, Vice Chancellor, Legal Affairs and General Counsel Lone Star College System
  • 2. E-Mail: Quick Facts ! In 2014, there were an estimated 600 billion e-mails sent each day ! Of those emails – 70% are “spam”
  • 3. Rule of Thumb ! An e-mail is a document. Do not put in an e-mail something you would not sign as a letter or memo.
  • 4. What does the “E” in e-mail stand for? ! Evidence ! Exhibit ! Embarrassment
  • 5. Example ! -----Original Message----- 
 From: 
 Sent: Monday, October 19, 2009 7:34 AM 
 To: 
 Subject: RE: FREN 1412 course etiquette 
 
 Even though he's a certifiable _______ , she can't just cut him off. Non-compliance with class etiquette requirements is another sort of problem to be dealt with in another way - if he's mentions lawsuit again we'll have to move to another level, though.

  • 6. E-Mail: Dangers ! No reasonable expectation of privacy. Anything that is put into e-mail becomes permanent. ! E-mail that is sent, received or stored on public server is discoverable and may be used against the entity. ! Inadvertently sent messages, it is easier than not to send confidential information to the wrong sender with the click of a mouse. ! Unlimited accessibility allows for dangers in security and e- mail fraud
  • 7. E-Mail: Responsibility ! E-mail is not an alternative to casual conversation. ! Treat as formal communication. E-mails sent from public accounts should be regarded with the same care as a formal memorandum or letter. ! Always assume that e-mail contents can be published for the world to see without your consent. ! Know when not to use e-mail. ! E-mails are subject to Public Information or Freedom of Information Acts.
  • 8. E-Mail: Responsibility ! When not to use email. ! Confidentiality is critical ! Message is likely to become extremely detailed and long. ! You need to confer with several people at once. ! You need to deliver bad news to one or more people.
  • 9. E-Mail: Responsibility ! Texas Attorney General Decisions ! Institutions of higher education are subject to the Texas Open Records Act, and records in their custody are available to the public unless excepted by a provision of the act or by some other law.1 1Attorney General Opinion No. JM-37
  • 10. E-Mail: Responsibility ! Texas Public Information Act ! The Public Information Act (hereinafter “The Act”) applies to records regardless of their format. It includes information that is maintained in paper, tape, microfilm, video, electronic data held in a computer memory, as well as other mediums specified under law.1 E-mails sent/received are subject to the Texas Public Information Act. 1 TEX. GOV’T CODE ANN. § 552.002 (Vernon 2004).
  • 11. E-Mail: Etiquette ! General Etiquette ! Respond to the e-mail you receive. ! Never convey anger, use profanity, make racist, ethnic, sexist or other potentially derogatory remarks. ! If you cannot reply quickly, let the sender know. ! Be professional!
  • 12. E-Mail: Etiquette ! Formatting errors ! Spell check ! Do not type in all caps ! Use proper punctuation ! Avoid slang ! Importance of salutations and closings. ! Use of signatures. ! Use of abbreviations. ! Use a proper, meaningful subject header.
  • 13. E-Mail: Final Thought Remember: “E” in Email stands for ! Evidence ! Exhibit ! Embarrassment E-mails are a direct representation of you.
  • 14. Prepared By: Brian S. Nelson, Vice Chancellor, Legal Affairs and General Counsel Lone Star College System 14